Instituting Controls in Systems Development Gurpreet Dhillon Virginia Commonwealth University.

Slides:



Advertisements
Similar presentations
System Integration Verification and Validation
Advertisements

BENEFITS OF SUCCESSFUL IT MODERNIZATION
More CMM Part Two : Details.
ITIL: Service Transition
Copyright 2005 CMMI and ITIL Alison Adams & Kieran Doyle.
The Systems Security Engineering Capability Maturity Model (ISO 21827)
Security Controls – What Works
Capability Maturity Model (CMM) in SW design
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Software Quality Assurance. CS351 - Software Engineering (AY2004)2 Software engineering processes Systems vs. Software –Terms often used interchangeably.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Capability Maturity Model
Enterprise Architecture
Release & Deployment ITIL Version 3
Effective Methods for Software and Systems Integration
Using Six Sigma to Achieve CMMI Levels 4 and 5
Gurpreet Dhillon Virginia Commonwealth University
SEC835 Database and Web application security Information Security Architecture.
Integrated Capability Maturity Model (CMMI)
Capability Maturity Model. Reflection Have you ever been a part of, or observed, a “difficult” software development effort? How did the difficulty surface?
Information Systems Security Computer System Life Cycle Security.
N By: Md Rezaul Huda Reza n
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
J. R. Burns, Texas Tech University Capability Maturity Model -- CMM n Developed by the Software Engineering Institute (SEI) in 1989 –SEI is a spinoff.
NIST Special Publication Revision 1
OHT 23.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The benefits of use of standards The organizations involved in standards.
Introduction to Software Engineering LECTURE 2 By Umm-e-Laila 1Compiled by: Umm-e-Laila.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Software Engineering Lecture # 17
NDIA Systems Engineering Supportability & Interoperability Conference October 2003 Using Six Sigma to Improve Systems Engineering Rick Hefner, Ph.D.
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
10/16/2015Bahill1 Organizational Innovation and Deployment Causal Analysis and Resolution 5 Optimizing 4 Quantitatively Managed 3 Defined 2 Managed Continuous.
@2002 Copyright, Itreya Technologies CMMI kick off July 2005.
Software Engineering - I
CS Process Improvement CMM Hans Van Vliet, Software Engineering, Principles and Practice, 3 rd edition, John Wiley & Sons, Chapter 6. W. Humphrey,
Process Improvement. It is not necessary to change. Survival is not mandatory. »W. Edwards Deming Both change and stability are fundamental to process.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Ch-1 Introduction The processes used for executing a software project have major effect on quality of s/w produced and productivity achieved in project…
Purpose: The purpose of CMM Integration is to provide guidance for improving your organization’s processes and your ability to manage the development,
An Introduction. Objective - Understand the difference between CMM & CMMI - Understand the Structure of CMMI.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Evidence about the Benefits of CMMI ® What We Already Know and What We Need to Know Joe Jarzombek, PMP Deputy Director for Software Assurance Information.
Copyright © EWA IIT, Inc. June 17, 2002 © 2002  IIT, Inc. EWA Information & Infrastructure Technologies, Inc. 3 FOR OFFICIAL USE ONLY June 17, 2002 ©
MSA Orientation – v203a 1 What’s RIGHT with the CMMI?!? Pat O’Toole
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
The NIST Special Publications for Security Management By: Waylon Coulter.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CMMI for Services, Version 1.3
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
CSCE 548 Secure Software Development Security Operations
Dr. Yeffry Handoko Putra, M.T
ITIL: Service Transition
State of Michigan Achieving Software Process Improvement with
CS4311 Spring 2011 Process Improvement Dr
Chapter 10 Software Quality Assurance& Test Plan Software Testing
Level 1 Level 1 – Initial: The software process is characterized as ad hoc and occasionally even chaotic. Few processes are defined, and success depends.
CMMI Overview.
Quality management standards
Software Engineering Lecture 16.
Software Engineering I
Capability Maturity Model
Capability Maturity Model
Chapter 4: Software Process Models
Presentation transcript:

Instituting Controls in Systems Development Gurpreet Dhillon Virginia Commonwealth University

Types of Security Breaches n Unauthorized or Accidental Access – Create – Read – Update – Delete – Execute (for Applications) n All security breaches are the result of System Failures

Types of System Failures n Missing Function – System does not perform function that it should n Additional Function – System performs function that it should not n Incorrect Function – System performs a function that it should, but using incorrect process Brill, Alan E. Building Controls into Structured Systems.

System Failures and Controls n Usually are the result of a design flaw, not a hardware or software malfunction n Controls to manage the occurrence of system failures – Audit Controls – Application Controls – Modeling Controls – Document Controls

Audit Controls n Audit controls – Examine – Verify – Correct n Provide a structured framework with which to perform the audit function n Record information necessary to perform the audit function

Application Controls n System Requirements – Accuracy – Completeness – Security n Type of application controls – Input – Processing – Output

Model Without Controls n Although security can be assumed, the security control points are not represented within the model Use r On- Line Accou nt

Model with Control Point n The authentication security control point is included; however, no functionality is specified On- Line Accou nt User Authentication Use r

Model with Full Control Included n The security control point is included, and all functionality of the control point is modeled On- Line Accou nt User Authentication Use r Accou nt Locked ? Passed ? Process Failure Locked Account Instructions

Documentation Controls n Necessary for ALL stages of the development cycle n Answers – Who, what, when, how, and – WHY

Process Improvement Software n Automated Learning and Discovery n Program Management Environments n Change Tracking n Requirements Tracking

The Systems Security Engineering Capability Maturity Model

SSE - CMM Background n Early 1980s - Watts IBM n National Security Agency (NSA) n Working Committees n SSE-CMM v 1.1 n SSE-CMM v 2.0 & ISSEA n ISO n SSE-CMM v 3.0

ISSEA Mission Statement n Promote and enhance SSE-CMM n Promote mature security capability to developers, vendors and agencies and ensure integral security in life cycles n Education and networking for community

n Constructed to guide process improvement in the practice of security engineering n Objective: created to advance security engineering as a defined, mature, and measurable discipline

A comparison of software & security engineering problems and their solutions… -schedule overruns -low quality results n Why assurance is important n What is ‘process assurance’

Level 1 Initial or Informal n No required processes

Level 2 Repeatable or Managed n Assure policy compliance n Manage requirements n Plan and track projects n Measure projects

Level 3 Well Defined n Establish improvement infrastructure n Identify required processes n Identify common processes n Deploy and manage processes n Collect process-level data n Conduct organization-wide training

Level 4 Quantitatively Managed/Controlled n Manage processes quantitatively n Establish capability baselines

Level 5 Optimizing n Develop change infrastructure n Evaluate and deploy improvements n Eliminate causes of defects

SSE-CMM Performance Targets Source: Gartner Group

How processes play a part….. process cabability: the range of expected results that can be achieved by following a process; a predictor of future project outcomes. process performance: measure of the actual results achieved by following a process. process maturity: the extent to which a specific process is explicitly defined, managed, measured, controlled, and effective

n The SSE-CMM defines eleven security-related process areas: ■ PA01 – Administer Security Controls ■ PA02 – Assess Impact ■ PA03 – Access Security Risk ■ PA04 – Access Threat ■ PA05 – Access Vulnerability ■ PA06 – Build Assurance Argument ■ PA07 – Coordinate Security ■ PA08 – Monitor Security Posture ■ PA09 – Provide Security Input ■ PA10 – Specify Security Needs ■ PA11 – Verify and validate security

Maturity Level Objective of Security Engineering Process Maturity Security Engineering PAs 1n/aNone 2plan security aspects of projects- project planning - project management 3- coordinate security aspects with internal project groups (systems engineering, software engineering) and external groups (certification team, accreditation team) - Security coordination - Intergroup coordination - External coordination 4- establish quality metricsQuantitative Process Management - quantify process management 5Guarantee security aspects of system or product Defect Prevention Security Engineering PA Maturity Level Placement

Using the SSE-CMM Source Selection Security Assessment SW Vendor Services HW Vendor System Development Operation and Maintenance SSE-CMM

10/24/96 Process Areas Common Features Base Practices Generic Practices Base Practices Generic Practices Common Features Base Practices Base Practices Process Areas Base Practices Continuously Improving Planned & Tracked Performed Informally Base Practices SSE-CMM Model Architecture Security Engineering Process Areas Organization Project Initial Capability Levels Well Defined Quantitatively Controlled Process Areas Capability Domain

Some benefits….. logical approach which provides a foundation for future changes flexible approach which can be molded to fit security needs of any project covers the entire life cycle of any project, from initial architecture decisions to monitoring of the O/S along with confidence, all aspects of the security spectrum have been met this model provides a clear roadmap for generating security requirements

The future of SSE-CMM….. n More plans to implement ideas discussed in SSAM (System Security Appraisal Methodology) n Further developments and release of training packages n Continue to support other activities such as other CMMs, procurement, and life-cycle support

References n Brill, Alan E. Building Controls into Structured Systems. n Ferraiolo, Karen, Williams, Jeffrey R., Landoll, Douglas J. “A Capability Maturity Model for Security Engineering” n Ferraiolo, Karen “Distinguishing Security Engineering Process Areas by Maturity Levels” n Ferraiolo, Karen, Cheetham, Christina “The Systems Security Engineering Capability Maturity Model” n n Gallagher, Lisa A., Thompson, Victoria “An Update on the Security Engineering Capability Maturity Model Project” n Hefner, Rick “System Security Engineering Capability Maturity Model” (1997 conference on software process Improvement CoSPI) n Menk, Charles “The SSE-CMM The Past, The Present and the Future”, October 1997 n n Phillips, Mike “Using a Capability Maturity Model to Derive Security Requirements”, March 2003 n n “A Systems Engineering Capability Maturity Model, Version 1.1”, CMU/SEI , November 1995 n “System Security Engineering – Capability Maturity Model Description Document, Version 2.0”, April 1999 n “System Security Engineering – Capability Maturity Model Description Document, Version 3.0”, June 2003 n “Describing the Capability Maturity Model”, The Gartner Group, September 2004 n n